My continuing saga of the black hat #hackers who stalk me relentlessly... last week, we showed you how the #DepartmentofLabor was hacking me - and I’ve proven how the #DOD, #DNI, and #CIA are hacking me too. But now, let’s dive a bit deeper into this, shall we?

This number continually calls me on my #ministry#prayer line. Yes, my number is public knowledge for the ministry - it’s NOT my personal number for a reason. However, “Defense Infomr” is directly tied to the #DOD. Makes you wonder why the @DeptofDefense is stalking a CIVILIAN.

I wonder if the @DoD_IG knows about how much money #Trump and his goons spend of TAX-PAYER dollars to stalk and harass me? A #minister. Who has #cancer, no less. Can you say desperate? I am a CIVILIAN and YES, I have a high level #security clearance as a civilian but I am NOT

I’ve just written this. I’m passionate about Twitter - always have been. I love how it is tackling fake accounts and hoping to reduce the amount of extremism online. But these adverts should be a priority.

Each of the accounts used in the scams are @verified and, last time this happened, I copied in @TwitterSupport so they knew it was happening. It looks like it takes about 30 mins-1 hour to take down these scams but that is long and the damage to innocent accounts lasts longer.

By @TimothyDSnyder
THREAD ✔
On February 27, 1933 the German Parliament building burned, Adolf #Hitler rejoiced, and the #Nazi era began.1/

#Hitler, who had just been named head of a #government that was legally formed after the democratic #elections of the previous November, seized the opportunity to change the system. “There will be no mercy now,” he exulted. “Anyone standing in our way will be cut down.”
2/

The next day, at Hitler’s advice and urging, the #German#president issued a decree “for the protection of the people and the state.”
3/

(1) The Chinese spy chips found in hardware of Apple and Amazon should have been expected. There's a long history of cases like this. #cybersecurity#defense#security

(2) The Senate Armed Services Committee warned of this threat in May 2012, and found over 1 million counterfeit parts is US military systems — largely from China. theepochtimes.com/fake-electroni…

(3) It reported: “The investigation uncovered dozens of examples ... including on thermal weapons sights delivered to the Army, on mission computers for the Missile Defense Agency’s Terminal High Altitude Area Defense (THAAD) missile, and on a large number of military airplanes.”

Friction is the enemy of #compliance. Before you conduct security awareness training for topics like third-party security, make sure you understand and FEEL the friction in the end-to-end experience for employees who have to follow those processes and policies. #UX matters. 1/

Sit with your sales team to understand the #UX of getting an NDA in place with a prospective customer or partner. Try to understand the pain and confusion when it comes to delays, manual steps, confusion, approval workflows, or lack of integration with things like #CRM. 2/

Ask yourself: do the right people have access to the #ContractManagement or e-signature systems, or do they need to REQUEST access and wait for approval? Do the systems support #SSO? Do people have to manually print and scan docs (in 2018!), and if so - do they know how? 3/

Forgetting about the “people” part of security is why we’ve heard “GRC is dead” for the last 10 years. We’re on “GRC 4.0” now and it *still* sucks.

GRC tools like Archer are designed for Process and Technology but forget about the poor People who have to use that dumpster fire.

We still have new vendors trying to design single-pane-of-glass “CISO dashboards”, meanwhile *very* few security companies are truly focused on people (not just security people) inside of organizations.

@duosec is one of the few companies who has focused on people. @habitu8 too

We have a huge credibility problem in information security and it's time we addressed it. We #infosec experts spend too much time asking "How do we get users to care more about security?" - and not enough time asking "How do we get security to care more about users?"

We give security advice without considering the impact to users in terms of cost, time, complexity, and risk of harm. A perfect example is "Turn on #2FA everywhere". It's #2factortuesday, right? I'm a fan. We spend endless hours debating whether SMS-based 2FA should ever be used.

Meanwhile we've spent ZERO time educating users on the risks of harm with #2FA. Namely, the risk that they could lose access to their account. The recovery procedures for 2FA-protected accounts are nearly impossible for average users. How honest are we about this with users?

Many people are too consume with the idea of owning a plot of land so sometimes feel too elated to do due verifications before making payment. In this thread, i will tell you how a survey plan search, an essential land check can save you from land trouble. THREAD👇👇👇

Before i go ahead, it is essential we understand what a survey plan means: A #Survey plan is a document that measures the boundary of a parcel of land to give an accurate measurement and description of that land #RealEstate#LandDebate

The people that handle #Survey issues are Surveyors and they are regulated by the office of the Surveyor general in #Lagos as it relates to survey issues in Lagos. #RealEstate

At the outset of the #Brexit process, most people assumed that a deal on #police and #judicial co-operation was easier to get than one on #trade. Time has shown this is not the case. Ongoing co-op on #JHA is one of the few items yet to be agreed on #withdrawal deal. Why?

Well, because the #EU and #UK's opening positions in the #negotiation are incompatible: Britain wants a #bespoke agreement with the EU, a la #Schengen, but is not willing to accept #ECJ or #EUCharter. EU wants to replicate existing models. What to do?

" Read the Senate’s executive summary of the CIA torture report
The report found that the methods used by the CIA were more brutal than the agency acknowledged either to Bush administration officials or to the public. "bostonglobe.com/news/nation/20…

@Mainframe_HQ 2/ A simple illustration of how information is transferred over the internet. Mr. A. switches on his data, his ID assigns him an IP address using DHCP (Dynamic Host Configuration Protocol).

The IP address contains personal info. about Mr. A such as his geographical location.

2) You corrupt congress into submission, get ultimate secrecy, and then collectively head down the rabbit hole. The #CIA has almost limitless power, and we were dumb enough to give it to them

3) The original intention of #MKULTRA may have been understanding mind control, and was to prevent other world powers from using it, but then it evolved into something different. Wildly different. #conspiracy